If you want to quickly share a folder residing in local drives or User Profile folders, open Properties dialog from right-click context menu, and then head over to Sharing tab. From Network File and Folder Sharing section, click Share to open File Sharing dialog. Now, select Everyone from drop-down menu, and click Add.

This will add Everyone group in File Sharing list, and allow you to change folder access permission. Using Read pull-down menu, you can give read and write permissions to users, and remove Everyonegroup from the File Sharing list.

Once done, click Share to share the folder on the network. It will open a separate dialog, allowing you to email and copy the shared folder link.

Now, you can access the shared folder from any PC connected on the network.

Question No: 3 HOTSPOT

Your company plans to deploy Windows 8 Enterprise to all client computers.

Users in the development department and the sales department will each receive a laptop that runs a corporate image of Windows 8 Enterprise.

In addition to running the corporate image of Windows 8 Enterprise, the users have the requirements described in the following table.

You need to recommend the appropriate technology for each department.

What should you recommend? (To answer, select the appropriate technology for each department in the answer area.)

Question No: 4

You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8.1 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.

Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.

You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.

What should you do?

Publish the application to Windows Store.

Publish the application through an intranet web site.

Change the default Software Restriction Policies on the client computers.

Obtain a public certificate for the web server, and then configure the web site to use SSL

Question No: 5

Your network contains an Active Directory domain named contoso.com. All client computers in the domain run Windows 8.1 Pro. All domain users have roaming user profiles.

You need to prevent a user named User2 from being able to save changes to his roaming user profile.

Which file you modify?

registry.pol

ntuser.pol

ntuser.dat

system.dat

Answer: B Explanation: Ntuser.pol

An archive file on client computers that is updated each time the Administrative Templates CSE sets a policy setting. As processing completes, an Ntuser.pol containing the history of applied registry based policies in the Group Policy managed policies tree is written to the

root of the user’s profile containing user policy settings and to the “all users” profile containing computer policy settings.(%Allusersprofile%\ntuser.pol for computer policy and

The NTUSER.DAT file on a Microsoft Windows computer is a registry file that stores the software and operating system settings for each user profile.

The System.dat and User.dat files are the data elements that compile all the registry information seen when you access the Regedit.exe graphical user interface in Windows. The Administrative Templates extension of Group Policy saves information in the Group Policy template in text files with the name Registry.pol. These files contain the customized registry settings that are applied to the Machine or User portion of the registry which you specify using the Group Policy snap-in.

Question No: 8

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders.

You join a new computer to the HomeGroup and try to access the HomeGroup shared folders.

You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect.

You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?

Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.

Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.

Change the default sharing configuration for the shared folders on the HomeGroup computers.

Reset your account password to match the HomeGroup password.

Answer: A

Explanation: You may receive a misleading error message when trying to join a Windows 7 Homegroup, when the computer#39;s date and time does not match the date/time of system that owns the homegroup

Symptoms

When joining a system to a homegroup, you may receive the following error message quot;The password is incorrectquot;, even though you have typed the password correctly.

Cause

This can be caused by a difference in the Date and Time settings on the computer trying to join the homegroup, and not an invalid password. If the date/time of the computer joining a homegroup is greater than 24 hours apart from the date/time of the system that owns the homegroup, this will cause the error.

Resolution

Adjust the date/time settings on the system joining the homegroup, to match the system that owns the homegroup, and then try to join again.

Question No: 10 DRAG DROP

You support computers that run Windows 8 Enterprise. Company policy requires that Microsoft Internet Explorer be the only browser allowed and supported.

You collect software metering data and discover that several users are running other third- party browsers.

You need to block other web browsers from running on the computers. All other applications should be allowed.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

Explanation:

Box 1:

Box 2: Enforce Executable rules.

Box 3:

Note:

Use Computer Configuration (not user configuration).

Restrict Access to Programs with AppLocker in Windows 7

If you share a computer and don’t want other users accessing certain applications, there is a new feature in Windows 7 that allows you to block them. We restrict what programs other users can access using AppLocker.